Messages by Thread
-
[RNG] confusion and diffusion in CSPRNGs
travis+ml-rng
-
[RNG] maxwell RNG
Sandy Harris
-
[RNG] OneRNG and avalanche breakdown
travis+ml-rng
-
[RNG] OneRNG - Hardware Random Number Generator
travis
-
[RNG] ‘We cannot trust them anymore’: Engineers abandon encryption chips after Snowden leaks — RT America
travis
-
[RNG] Zuckerman and Randomness Extractors
travis+ml-rng
-
[RNG] Man hacked random-number generator to rig lotteries, investigators say | Technology | The Guardian
travis
-
[RNG] Truecrypt Phase II completed, 4 vulns identified
travis+ml-rng
-
[RNG] Cracking PHP rand()
travis
-
[RNG] high entropy RNG via atomic decay
travis+ml-rng
-
[RNG] hacking crappy password resets
travis+ml-rng
-
[RNG] now this is how you fix RNG bugs (OpenBSD 5.7) - default secure
travis+ml-rng
-
[RNG] erlang, RNGs, and security
travis+ml-rng
-
[RNG] Juniper RNG bugs
travis+ml-rng
-
[RNG] 9% of all HTTPS hosts and 6% of all SSH hosts on the web use hardcoded private keys embedded in firmware
Travis
-
[RNG] PRNG fingerprinting of browsers
travis
-
[RNG] Shannon's "mind reading" machine and poor human-generated randomness
Travis Hassloch
-
[RNG] Randomness for crypto, github repositories
Sandy Harris
-
[RNG] FDE on-drive - RNG fails
travis+ml-rng
-
[RNG] RNGs, FIPS, and autoseeding
travis+ml-rng
-
[RNG] entropy-as-a-service platform
travis+ml-rng
-
[RNG] Lottery security chief found guilty of hacking Hot Lotto to win $14.3 million | HOTforSecurity
travis
-
[RNG] DIY PRNGs fail - another example
travis+ml-rng
-
[RNG] Android OS RNGs fail again
travis+ml-rng
-
[RNG] Fp rng alg
travis
-
[RNG] Randomly Failed! RNGs in Java
travis+ml-rng
-
[RNG] TrueCrypt Audit Completed, 2 High Severity Issues Found - Softpedia
travis
-
[RNG] HTTPS-crippling FREAK attacks become cheaper and easier to carry out | Ars Technica
travis
-
[RNG] PCGs - fast, "hard to predict" PRNG
travis+ml-rng
-
[RNG] number of bits to store order of a deck of cards
travis+ml-rng
-
[RNG] Microsoft's Wichmann Hill RNG
travis+ml-rng
-
[RNG] FreeBSD RNG broken
travis+ml-rng
-
[RNG] Lotteries and RNG... what are the odds.
Tom Mitchell
-
[RNG] [[email protected]: Helping the entropy pool in a (Debian) live system]
travis+ml-rng
-
[RNG] OneRNG - an open source entropy generator by Paul Campbell - Moonbase Otago — Kickstarter
travis
-
[RNG] RNG predictor attacks (old, generic ideas)
travis+ml-rng
-
[RNG] LibreSSL's PRNG is Unsafe on Linux [Update: LibreSSL fork fix]
travis
-
[RNG] RFC possible changes for Linux random device
Sandy Harris
-
[RNG] Knuth Shuffle and the modulo bias
travis+ml-rng
-
[RNG] seeds: it takes 226 bits of entropy to shuffle a card deck
travis+ml-rng
-
[RNG] PRNG seeding rules
travis+ml-rng
-
[RNG] Java SecureRandom, Java.util.Random, breaking LCRGs, use of LCG/CLCG in gambling
travis+ml-rng
-
[RNG] Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy | USENIX
travis
-
[RNG] Linux has getrandom(2) now?
travis+ml-rng
-
[RNG] Phidelius: Constructing Asymmetric Keypairs From Mere Passwords For Fun and PAKE | Dan Kaminsky's Blog
travis
-
[RNG] SipHash: a fast short-input PRF
travis
-
[RNG] Offline bruteforce attack on WiFi Protected Setup
travis
-
[RNG] PRNG seed extractor
travis+ml-rng
-
[RNG] nothing-up-my-sleeve numbers
travis+ml-rng
-
[RNG] how do you know if a RNG is working?
travis+ml-rng
-
[RNG] Crypto Won’t Save You Either
travis
-
[RNG] A Quantum Random-Number Generator On Your Phone | Popular Science
travis
-
[RNG] Nokia QRNG
travis+ml-rng
-
[RNG] crypto under chosen distribution attacks (PK + weak RNG = ?)
travis+ml-rng
-
[RNG] another chaos theory guy takes on RNGs
travis+ml-rng
-
[RNG] thoughts on suborning HWRNGs
travis+ml-rng
-
[RNG] on the impact of predictable RNGs in SSL
travis+ml-rng
-
[RNG] why RNG transparency matters
travis+ml-rng
-
[RNG] non-random structure in GUIDs and UUIDs
travis+ml-rng
-
[RNG] Lacharme - The Linux Pseudorandom Number Generator Revisited
travis+ml-rng
-
[RNG] Vuillemin - Entropy transfers in the Linux /dev/random generator (2012)
travis+ml-rng
-
[RNG] quintesence qstream laser-based HWRNG
travis+ml-rng
-
[RNG] more quintessence RNG stuff
travis+ml-rng
-
[RNG] security research on Fortuna CSPRNG
travis+ml-rng
-
[RNG] Clive Robinson drops a dual-oscillating bomb
travis+ml-rng
-
[RNG] Linux /dev/random problems (with comments from Theo T'so)
travis+ml-rng
-
[RNG] Haveged - A Simple Entropy Daemon
travis+ml-rng
-
[RNG] Linus Torvalds refuses to remove RDRAND input to /dev/random
travis+ml-rng
-
[RNG] the unpredictability distribution daemon
travis+ml-rng
-
[RNG] entropy-gathering daemon (userland PERL replacement for /dev/random)
travis+ml-rng
-
[RNG] what can bad rngs affect?
travis+ml-rng
-
[RNG] Use process ID in mixing?
Sandy Harris
-
[RNG] Myths about /dev/urandom
travis
-
[RNG] why does openssl not use /dev/urandom
travis+ml-rng
-
[RNG] fork safety and PRNGs
travis+ml-rng
-
[RNG] hedged cryptography; robust with weak/bad RNGs
travis+ml-rng
-
[RNG] OpenSSL wiki on RNG, RNG fails
travis+ml-rng
-
[RNG] Cryptography Breakthrough Could Make Software Unhackable - Wired Science
travis
-
[RNG] question about the recent improvment of generator polynomials in linux
Hannes Frederic Sowa
-
[RNG] randomness testing & distinguishing attacks
travis+ml-rng
-
[RNG] PRNG designs
travis+ml-rng
-
[RNG] more RNG links
travis+ml-rng
-
[RNG] miscellaneous RNG links
travis+ml-rng
-
[RNG] RNGs in news
travis+ml-rng
-
[RNG] better defensive application randomness [was: research ideas on the Dual_EC_DRBG backdoors]
coderman
-
[RNG] research ideas on the Dual_EC_DRBG backdoors
travis+ml-rng
-
[RNG] NSA paid RSA $10M to use flawed RNG in BSAFE
travis+ml-rng
-
[RNG] impact of RNGs in TLS/SSL
travis+ml-rng
-
[RNG] on RDRAND x86 instruction
travis+ml-rng
-
[RNG] fixing the RNG problem
travis+ml-rng
-
[RNG] insecurities in Linux /dev/random
travis+ml-rng
-
[RNG] how to configure BSAFE to not use Dual_EC_DRBG
travis+ml-rng
-
Re: [RNG] [Cryptography] randomness +- entropy
John Denker
-
Re: [RNG] [Cryptography] suggestions for very very early initialization of the kernel PRNG
Arnold Reinhold
-
Re: [RNG] suggestions for very very early initialization of the kernel PRNG
John Kelsey